CVE-2025-67230
Published: 23 January 2026
Summary
CVE-2025-67230 is a high-severity Incorrect Default Permissions (CWE-276) vulnerability in Todesktop Builder. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 3.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Access control policy can specify and enforce secure default permissions for resources.
Guides setting of default permissions to the minimum required level.
Establishes requirements for appropriate default permissions on system resources as part of configuration management.
Baseline establishment and updates on install/upgrade ensure correct default permissions rather than insecure ones.
Requiring the most restrictive settings instead of defaults prevents incorrect default permissions on resources.
Requires documented processes that include setting and maintaining correct default permissions for configuration items.
Requires addressing secure default permissions in physical and environmental protection controls.
Tailoring explicitly overrides or scopes default permission assignments in the baseline to match the system's actual risk and operational needs.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in custom URL scheme handler directly enables exploitation for client execution via malicious protocol invocation from renderer context.
NVD Description
Improper permissions in the handler for the Custom URL Scheme in ToDesktop Builder v0.33.0 allows attackers with renderer-context access to invoke external protocol handlers without sufficient validation.
Deeper analysisAI
CVE-2025-67230 is an improper permissions vulnerability (CWE-276) affecting the handler for the Custom URL Scheme in ToDesktop Builder version 0.33.0. Published on 2026-01-23, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H). The issue stems from insufficient validation, enabling attackers with renderer-context access to invoke external protocol handlers.
Exploitation requires low privileges (PR:L) and renderer-context access, occurring over the network (AV:N) but demanding high attack complexity (AC:H) and user interaction (UI:R). Successful attacks can achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U).
Mitigation guidance appears in ToDesktop's security advisory TDSA-2025-002 at https://www.todesktop.com/security/advisories/TDSA-2025-002 and changelog at https://www.todesktop.com/changelog.
Details
- CWE(s)